Login / Signup
Using the vulnerability information of computer systems to improve the network security.
Yeu-Pong Lai
Po-Lun Hsia
Published in:
Comput. Commun. (2007)
Keyphrases
</>
computer systems
network security
computer networks
intrusion detection system
computer security
data processing
information systems
human beings
communication systems
intrusion detection
computing systems
high end
databases
information sharing
risk assessment
security risks